Domain 2 - Network Security

Card Set Information

Author:
mpskeeter
ID:
310876
Filename:
Domain 2 - Network Security
Updated:
2015-11-04 06:00:20
Tags:
Security Network
Folders:
Security+
Description:
Security+ Domain 2 - Network Security
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user mpskeeter on FreezingBlue Flashcards. What would you like to do?


  1. 802.11a
    • Speed: 54 Mbps
    • Bit Rate: 5 GHz
    • Distance I/O: 50-100 feet
  2. 802.11b
    • Speed: 11 Mbps
    • Bit Rate: 2.4 GHz
    • Distance I/O: 150-300 feet
  3. 802.11g
    • Speed: 54 Mbps
    • Bit Rate: 2.4 GHz
    • Distance I/O: 150-300 feet
  4. 802.11n
    • Speed: 600 Mbps
    • Bit Rate: 2.4/5 GHz
    • Distance I/O: 350-600 feet
  5. 802.11ac
    • Speed: +1.69 Gbps
    • Bit Rate: 2.4/5 GHz
    • Distance I/O: 350-600 feet
  6. CAT 1
    • Speed: Voice
    • Usage: POTS
  7. CAT 2
    • Speed: 4 Mbps
    • Usage: Token Ring
  8. CAT 3
    • Speed: 10 Mbps
    • Usage: 10Base-T
  9. CAT 4
    • Speed: 16-20 Mbps
    • Usage: 16 MB Token Ring
  10. CAT 5e
    • Speed: 1000 Mbps
    • Usage: 10 100 & 1000Base-T
  11. CAT 6
    • Speed: 1000 Mbps
    • Usage: High Speed - Broadband
  12. CAT 7
    • Speed: 1000 Mbps
    • Usage: Proposed Standard
  13. Firewalls
    • Packet Filtering Firewall
    • Stateful Inspection Firewall
    • Application Level Gateway
    • Circuit Level Proxy
    • SOCKS
    • Proxy Server
    • Network Address Translation (NAT)
    • Dynamic NAT
    • Static NAT
    • Port Address Translation (PAT)
    • Security Zones
    • VPN Concentrator
    • All in One Applicances
    • Flood Guards
  14. Packet Filtering Firewall
    • Filters traffic to specific addresses based on IP header of each packet.
    • Packets compared to ACL and either forwarded or dropped.
    • Works at Layer 3
  15. Stateful Inspection Firewall
    • Maintains a state table.
    • Looks at state table if connection has already been made.
    • If no previous connection, then looks at ACL, else allows it .
    • Works at Layer 3 and Layer 4
  16. Application Level Gateway
    • Slowest form of firewall.
    • Works at Layer 7
  17. Circuit Level Proxy
    • PuTTy is an example of Circuit Level Proxy.
    • Works at Layer 5
  18. SOCKS
    Network protocol designed to allow clients to communicate with internet servers through firewall.
  19. Proxy Server
    A border device used to protect security zones.
  20. Network Address Translation (NAT)
    • Translates a private address into a public address.
    • Effectively hides network from the world.
    • Dynamic NAT
    • Static NAT
    • Port Address NAT
  21. Dynamic NAT
    Pulls from pool of public IP addresses to be shared by a private IP subnet.
  22. Static NAT
    Stateless implementation that transforms only the network part of the address, leaving the host part intact.
  23. Port Address Translation (PAT)
    • Allows many hosts to share a single IP address by multiplexing streams differentiated by TCP/UDP port numbers.
    • Many-to-One
  24. Security Zones
    • DMZ: contains public facing servers
    • Intranet: Internal network.
    • Extranet: Segment set aside for trusted partners, organizations.
    • Internet: unsecured security zone
  25. VPN Concentrator
    Multiple VPN connections.
  26. All in One Appliances
    • Device combining numerous security functions into one.
    • Also know as Unified Threat Management (UTM).
  27. Flood Guards
    Prevents some flooding of DoS attacks.
  28. Cloud Computing
    • Software as a Service (SaaS)
    • Platform as a Service (PaaS)
    • Infrastructure as a Service (IaaS)
  29. Software as a Service (SaaS)
    Example: Office 365
  30. Platform as a Service (PaaS)
    Example: Salesforce.com
  31. Infrastructure as a Service (IaaS)
    Example: Platform virtualization environement
  32. Antennas
    • Directional
    • Omni Directional
  33. Yagi
    • Hi-Gain
    • Directional
  34. Parabolic
    • Point-to-Point
    • Focus
  35. Panel
    Directional
  36. Wireless Encryption and Authentication
    • Open
    • Pre-Shared Key
    • 802.1X/EAP
    • MAC authentication/Filtering
  37. Wired Equivalent Privacy (WEP)
    • Initialization Vector (IV) is the main weakness, use WPA
    • Uses RC4
  38. Wi-Fi Protected Access (WPA)
    • Provides built-in authentication
    • TKIP w/RC4
  39. Wi-Fi Protected Access 2 (WPA2)
    • Counter Mode with Cipher Block Chaining Message Authorization Code Protocol (CCMP) uses AES
    • CCMP/AES
  40. APIPA
    • IPV4: 1649.254.x.x
    • IPV6: fe80::
  41. Loopback
    • IPV4: 127.x.x.x
    • IPV6: fd (Globally Unique)
  42. OSI Model
    • 7 - Application            Data                 All
    • 6 - Presentation          Data                 People
    • 5 - Session                 Data                 Seem
    • 4 - Transport              Segments          To
    • 3 - Network                Packets             Need
    • 2 - Data-Link              Frames             Data
    • 1 - Physical                Bits                  Processing
  43. DoD Model
    • Application
    • Transport
    • Internet
    • Network
  44. OSI Model - 7 - Application (Protocols)
    • FTP
    • Telnet
    • SMTP
    • HTTP
    • SNMP
  45. OSI Model - 6 - Presentation
    • JPG
    • MPEG
    • GIF
    • MP3
    • HTML
  46. OSI Model - 5 - Session
    • RPC
    • SQL
    • NFS
    • NetBios
    • SSL/TLS
  47. OSI Model - 4 - Transport
    • SSH
    • TCP
    • UDP
    • NetBEUI
    • RTP
  48. OSI Model - 3 - Network
    • IGMP
    • IGMP
    • IP
    • IPV4/IPV6
    • IPSec
  49. OSI Model - 2 Data-Link
    • PPP
    • PPTP
    • L2TP
    • ARP
    • RARP
  50. OSI Model - 1 - Physical
    • USB
    • DSL
    • Firewire
    • ISDN
    • ATM
  51. Remote Desktop Protocol (RDP)
    • Allows a user to control a network computer.
    • Port should always be blocked by the firewall rule for inbound traffic.
  52. Point-to-Point Tunneling Protocol (PPTP)
    • Encapsulates and encrypts PPP packets
    • Operates at Layer 2
    • Port: TCP 1723
  53. Layer 2 Tunneling Protocol (L2TP)
    • Hybrid of PPTP and L2F
    • Uses IPSec to provide data encryption and integrity
    • Operates at Layer 2
    • Port: UDP 1701
  54. Internet Protocol Security (IPSec)
    • Transport Mode
    • Tunnel Mode
  55. Authentication Header (AH)
    • Only provides Integrity and Availability
    • Protocol: #51
    • Algorithms: SHA-1, MD5
  56. Encapsulating Security Payload (ESP)
    • Provides Confidentiality, Integrity, and Availability
    • Protocol: #50
    • Algorithms: AES, 3DES, DES

What would you like to do?

Home > Flashcards > Print Preview